This Cloud is a Smoke Screen

The cloud is the big thing these days. In the security world, we are concern about possible security issues, but what real world issues are we most likely to face? Parameter Security’s managing Partner Dave Chronister will discuss real world issues he has encountered over the past year. He will also discuss a 0-Day exploit that his firm discovered in a production environment which allowed them to lock out all users and gain access to all systems housed in the cloud. Dave will discuss security issues you should consider while performing due diligence on your cloud-based solutions.

This live demo will show you how you can seamlessly blend business communications into your cloud work environment, transforming Microsoft Office 365 into an enterprise-grade communications hub with an easy-to-use interface that is very simple for end-users to deploy and IT to manage.

Make it easy for employees to initiate PSTN calls and SMS, view screen pops with relevant information, automatically log the calls, and more -- without ever leaving Office 365. You’ll also see how easy it is to add new users and make changes as your business evolves with RingCentral’s cloud based communications system.

Our expert presenter will walk you through how it works and answer your questions. You’ll see:

•How to place calls with one click from within Office 365
•Views of customer profile and communications history
•Automated ticket creation from calls

The biggest challenge in security is no longer technology. We need to rise from recognition as security experts and experts within security teams to leaders protecting information from a world of risk and vulnerabilities.

Michael Santarcangelo cracked the code on the pathway to becoming an exceptional security leader. On July 30, 2015 at 1:00PM Eastern Michael will share the Exceptional IT Leadership Framework, including the 5 foundational elements, 9 competencies, and 5 essential habits. The webcast will explore the benefits of a framework-based, competency-driven approach to developing your leadership and how to assess where you really are in your leadership journey.

The first installment of our performance benchmarking Webcast series, “Storage Performance Benchmarking: Introduction and Fundamentals” aims to bring anyone untrained in the storage performance arts to a common base with the experts. In this first webcast, gain an understanding of the complexities of benchmarking modern storage arrays and learn the terminology foundations necessary for the rest of the series. This includes:
•The different kinds of performance benchmarking engagements
•Metrics: why the “right” metrics matter, and an introduction to the variety of metrics that may be relevant to your business
•Terminology basics: iops, op/s, throughput, bandwidth, latency/response time

A seemingly never-ending string of large scale data breaches across all sectors of the economy and government have had devastating affects on countless individuals — and irreparably damaged organizations of all kinds. It’s been proven that privileged users, and the accounts and credentials they use, are a crucial element in conducting a successful attack. But it’s possible to protect those users and stop data breaches in their tracks.

In this webcast, we’ll explain how Xsuite and privileged identity management can stop attackers at multiple points in the data breach lifecycle, preventing damage and disruption. Join us to learn:

- Who are privileged users and why are they important?
- How do attackers exploit privileged users and their credentials to carry out breaches?
- See a hands-on demonstration of Xsuite and how it can manage, control, and protect privileged users and credentials and your business assets.

Register now to join us live at 1:00 pm ET Thursday, July 30, 2015 or on demand afterwards.

In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.

Sharing documents through email can be risky! Sensitive data, or metadata, such as tracked changes or hidden columns in excel, can be hidden within documents and inadvertently sent outside your organization. This could potentially be very harmful.

Join us to see how Professional 9 helps protect your documents! We'll demo how to identify and clean hidden data from documents and how to securely send files outside your organisation.

2,000 firms are already enjoying the benefits of Professional 9. Attend this webinar to see why.

The need for a Security Transformation in the enterprise has been clear to our industry for quite some time and the struggle to protect our data in today’s business environment has been a main focus. At the same time, in an increasingly mobile-centric workforce, organizations are dealing with the shift from analog to digital and require more compliance and policy to protect against breaches, lack of transparency and accountability. To keep up with these changing demands, IT decision makers and their organizations must be more agile, manageable and responsive to a different set of challenges that arise. Join this session to hear Justin Somaini, Chief Trust Officer at Box, detail what security transformation will look like in the coming year and how it will redefine the responsibilities of vendors, cloud providers, and security practitioners to resolve one of the most significant security problems of the past 40 years.

With users expecting 24x7 access to web applications and data from all types of mobile devices and from any location, it’s not a surprise that data security is still a key focus for most enterprises. How do you reduce risk by bringing contextual information into the authentication process?

Cyber threats are at an all-time high, presenting numerous challenges to organizations and end users. Additionally, with the increasing importance of mobile devices and Bring Your Own Device (BYOD) initiatives, endpoint management and security is becoming more critical. In light of these trends, proactively protecting against threats is a constant and ever-changing battle. Verisign DNS Firewall is a cloud-based network security and threat intelligence service built upon our global recursive DNS platform that offers robust protection from unwanted content and malware as well as customizable filtering down to the individual DNS level. Verisign DNS Firewall provides organizations with the opportunity to secure the rapidly growing landscape of devices on their networks with a single, simple modification – an update of the recursive DNS settings.

Delivering a Single SignOn (SSO) experience to users of native applications is becoming more and more critical as the number of such applications grows. We'll cover the best practice for native applications authenticating to restful APIs, the different models for enabling SSO across such applications, and how recent enhancements to the mobile OSs promise to offer to a nice balance between usability, security, and deployment ease.

Android apps handle our most sensitive data – private conversations, financial information, phone calls, SMS, geographic locations. You name it… the question is – can we really tell whether they’re secure? Who can assure us they are not spying on us? Can they be abused? Erez will answer those questions, focusing on Android mobile apps and their common vulnerabilities.

This session will be all about the security of such applications, how they can be hacked, the common mistakes developers do, and how to avoid such mistakes.

In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT.

Decades of experience in fighting cybercrimes has greatly informed how Microsoft develops products. Michael Quinn (General Manager, Cybersecurity & Data Protection, Microsoft) discusses the features, policies, and practices that make the Microsoft Cloud so secure and set it apart from other options on the market.

Today's problem is that all MOBILE DEVICES use Pseudo Random Number Generators, which is true of any brand or type. This exposes devices to potential mobile attacks. However, tomorrow's problems are that societal shifts will manage more of our personal data on mobile devices and this will become acute with the Internet of Things set to increase the number of devices that are connected.

Join us on August 11th to gain expert advice on enterprise application and mobile security. Here you will learn market dynamics, possible risks and effective solutions you can use while working within your budget.

The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.

The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.

In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.

Cybercrime impacts millions of people around the world. David Finn, Executive Director of the Microsoft Digital Crimes Unit, gives you a behind the scenes look at how Microsoft is going on the offensive to stop criminals, refer perpetrators to law enforcement, and create a safe digital world.

Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).

Tom Bowers, vCISO for ePlus and their clients, will cover what he sees as the looming threats for 2016, including Threat Intelligence and Sharing, State Sponsored Code and Commercial Malware, Security of Big Data, Embedded Systems, and the Physical and Cyber Convergence.

Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service

Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.

The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.

This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.

The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

So what can you do today to keep your security ahead of these trends?

This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

We will also talk about:

- The latest strategies and techniques cyber-criminals are using today
- Concrete steps you can take to keep your organization safe
- What to do about Internet security in today's cloud and mobile first IT landscape

As security incidents grow in frequency and complexity businesses struggle to be prepared to respond and mitigate the threat. Incident detection and response is expected to take up the majority of security budgets by 2020 but solutions are siloed and specialized staff is hard to hire and retain. How can security professionals who may not be experts in incident response detect and assess the scope of potential incidents or breaches effectively? This case study will explore this question leveraging real-world examples that illustrate how to confidently detect and respond to security incidents 10x faster.

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.